Compsac 2016 Banner

COMPSAC 2016: The 40th IEEE Computer Society International Conference on Computers, Software & Applications

Atlanta, Georgia, USA - June 10-14, 2016

Connected World: New Challenges for Data, Systems & Applications


STPSA 2016: The 11th IEEE International Workshop on Security, Trust, and Privacy for Software Applications

Author Link: STPSA Paper Submission

Organizing Chair

Mohammad Zulkernine, Queen’s University, Canada

Program Chairs
H. Takabi, University of North Texas, USA
Sheikh Iqbal Ahamed, Marquette University, USA

Publicity & Proceedings Chair
Mohammad Ashiqur Rahman, Tennessee Tech University, USA

Goals of the Workshop
This workshop will bring researchers from academia and industry to discuss methods and tools to
achieve security, trust, and privacy goals of both pervasive and pervasive software applications.
This workshop will focus on techniques, experiences and lessons learned with respect to the state
of art for the security, trust, and privacy aspects of both pervasive and non-pervasive software
applications along with some open issues.

Theme of the Workshop
Information security has become a major concern for both pervasive and non-pervasive software applications. Software systems must be engineered with reliable protection mechanisms with respect to security, privacy, and trust, while still delivering the expected value of the software to their customers. The traditional approaches to secure a system (e.g., IDS, firewalls) are no longer sufficient to address many security, trust, and privacy (STP) issues. These issues should be addressed by building more effective STP-aware software applications. The principal obstacle in developing STP-aware software is that current software specification, design, implementation, and testing practices do not include adequate methods and tools to achieve security, trust, and privacy goals.

As most systems now are Internet-based, the number of attackers is increased dramatically and threat scenarios have changed. Traditional security measures do not fit well for the software of pervasive applications. Since location and contexts are key attributes of pervasive applications, the privacy issues need to be handled in a novel manner than traditional software applications. The devices in pervasive computing leave and join in ad hoc manner in the pervasive network. These create a need for new trust models for pervasive computing applications. In this workshop, we will also welcome papers on the challenges and requirements of security, privacy, and trust for pervasive software applications.

Scope of the Workshop

Topics of interest include, but are not limited to, the following:

*    Security, trust, and privacy specific software development practices
*    Security, trust, and privacy requirements elicitation and specification
*    Models and languages for STP-aware software specification and design
*    Architecture for STP-aware software development
*    STP challenges for pervasive software applications
*    Testing security, trust, and privacy properties of both pervasive and non-pervasive software
*    STP management and usability issues in software applications
*    User interfaces for STP-aware pervasive and non pervasive software
*    Software reengineering for security, trust, and privacy for both pervasive and non pervasive applications
*    Tradeoffs among security, privacy, trust, and other criteria
*    STP challenges in e-services, e.g. e-health, e-government, e-banking, e-commerce, e-marketing and other web-based and pervasive applications
*    STP challenges in mobile software applications
*    STP issues in sensor based software applications
*    User interfaces for secure and privacy-aware pervasive computing applications
*    STP-aware service discovery mechanisms for pervasive computing environments
*    Models for ensuring security, trust, and privacy in pervasive software applications
*    STP issues for handheld device software applications
*    Teaching STP-aware  software development
*    Experience reports on developing STP-aware software

The length of a camera ready paper will be limited to 6 pages (IEEE Proceedings style) with up to 2 additional pages (with charges for each additional page) printed on 10-12 point fonts. Authors must follow IEEE CS Press Proceedings Author Guidelines to prepare papers. At least one of the authors of each accepted paper is required to pay full registration fee and present the paper at the workshop in person.


COMPSAC Sponsors



IEEE Computer Society logo

IEEE logo           

IEEE Big Data    

IEEE Future Directions


Information Processing Society of Japan   

Korean Institute of Information Scientists and Engineers logo   


China Computer Federation logo

Industry Supporters




Authors: Paper Submission

Please click this link to go to the main conference/symposia paper submission system.

Workshop paper submission links are available on the individual workshop web pages. 

IEEE Author Guidelines

Contact Us

Program Committee Chairs:


Important Dates

September 25, 2015  Extended: October 15, 2015: Workshop/tutorial proposals due

November 30, 2015: Main conference abstracts due (optional)

December 11, 2015Extended: December 23, 2015: Main conference submissions due

February 29, 2016: Main conference paper notifications

March 6, 2016: Extended: March 18, 2016: Workshop papers due; Fast Abstract papers due

March 7, 2016: Doctoral Symposium papers & Posters due

March 15, 2016: Doctoral Symposium & Poster notifications

March 21, 2016: Doctoral Symposium & Poster camera ready & registration due

March 28, 2016: Workshop & Fast Abstract paper notifications

April 7, 2016: Camera ready and registration due